June 02, 2020
While the world is struggling to get a grip over one of the most advanced pandemics, cyberattackers aren’t going anywhere. 𝐂𝐡𝐞𝐜𝐤 𝐨𝐮𝐭 𝐬𝐨𝐦𝐞 𝐨𝐟 𝐭𝐡𝐞 𝐛𝐢𝐠𝐠𝐞𝐬𝐭 𝐡𝐚𝐜𝐤𝐬 𝐚𝐧𝐝 𝐝𝐚𝐭𝐚 𝐛𝐫𝐞𝐚𝐜𝐡𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟎:
In January, Microsoft discloses security breach of customer support database, contained in roughly 250 million entries.
US cannabis users
In the same month, researchers found a leaky AWS bucket exposed online that contained the personally identifiable information of 30,000 individuals linked to the medical and recreational marijuana.
In February, Estée Lauder exposed 440 million internal records in a security breach. The hacked database contained 440,336,852 records including internal company emails.
In March, T-Mobile revealed a security incident in which cyber attackers were able to successfully infiltrate the firm’s email services, leading to the compromise of T-Mobile customer and employee information.
A total of 5.2 million hotel guests were impacted by a data breach in March.
Japanese gaming company Nintendo confirmed today that hackers gained unauthorized access to around 160,000 user accounts since the start of the month.
On May 19, budget airline EasyJet said that information belonging to nine million customers may have been exposed, including over 2,200 credit card records, following a cyberattack. EasyJet is now facing an £18 billion class-action lawsuit due to the incident.
Two significant zero-day vulnerabilities for iOS users
Two zero-day vulnerabilities were found by ZecOps startup enabling successful remote attacks on iOS users with devices running iOS 6 or above. For more information check this article.
Phishing – The story about the Phish, the Whale and the Spear
Phishing, spear phishing, and whaling attacks share many similarities – all involve using impersonation to elicit information or money from a given target. However, there are a few differences, find them here.
Non-Malware or Fileless Attack, In A Nutshell
Non-Malware or Fileless Attack can destabilize your organization’s network using existing applications, protocols or software to gain access into your network. Find out what is fileless attack and how do you protect against it.
Protection Against COVID-19 Malicious Campaigns and Malware
Adversaries are targeting individuals across all the industries with treacherous campaigns and attack categories. Some of the most common campaigns include these.
Stay Safe with TrustNet!